نتایج جستجو برای: reboot
تعداد نتایج: 306 فیلتر نتایج به سال:
This paper is all about the public library digital initiative for farmers with much emphasis onthe concept of library, services, advantages disadvantages use technologies in agriculture and rural area, condition transformation, challenges, conclusion recommendations.It was found that Public Libraries so far done nothing who have been potential users Libraries. Library timings do not suit farmer...
This study is concerned with the performance modeling of a fault tolerant system consisting of operating units supported by a combination of warm and cold spares. The on-line as well as warm standby units are subject to failures and are send for the repair to a repair facility having single repairman which is prone to failure. If the failed unit is not detected, the system enters into an unsafe...
On reboot after a crash, the file system should be consistent: e.g., previously correct files should not now contain garbage. In early file systems, getting to a consistent state involved a full scan after reboot. This was very slow, and impractical for large systems. Modern file systems improve upon this by writing updates to disk in a specific order : e.g, metadata before commit blocks. This ...
This paper presents a measurement-based dependability study of a Networked Windows NT system based on field data collected from NT System Logs from 503 servers running in a production environment over a four-month period. The event logs at hand contains only system reboot information. We study individual server failures and domain behavior in order to characterize failure behavior and explore e...
We report observations which confirm the identities of the optical counterpart to the transient sources RX J0544.1-7100 and RX J0520.5-6932. The counterparts are suggested to be a B-type stars. Optical data from the observations carried out at ESO and SAAO, together with results from the OGLE data base, are presented. In addition, X-ray data from the RXTE all-sky monitor are investigated for lo...
The ReRISC processor gives users the opportunity to create application specific instructions for enhanced performance while providing the programming convenience of a conventional RISC processor. The core of the ReRISC consists of an array of 38x8 computational elements, each with 8 configuration contexts that are selectable on a cycle by cycle basis. The computational elements default to the M...
The association between the Pencil nebula (RCW 37, NGC 2736), the Vela X-ray fragment D/D' and the recently discovered new X-ray supernova remnant (RX J0852.0-4622) in Vela is investigated. Recently published Chandra images of D/D' are compared with optical images of RCW 37 and confirm the close association of the two objects. New optical line profiles of RCW 37 from an extended slit position p...
In previous research, the computer frustrations of student and workplace users have been documented. However, the challenges faced by blind users on the Web have not been previously examined. In this study, 100 blind users, using time diaries, recorded their frustrations using the Web. The top causes of frustration reported were (a) page layout causing confusing screen reader feedback; (b) conf...
We demonstrate an attack on the secure bootchain of the Nintendo 3DS in order to gain early code execution. The attack utilizes the block shuffling vulnerability of the ECB cipher mode to rearrange keys in the Nintendo 3DS’s encrypted keystore. Because the shuffled keys will deterministically decrypt the encrypted firmware binary to incorrect plaintext data and execute it, and because the devic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید